"The sales department has been very responsive to our needs, equipment has been delivered in a timely manner and the parts and service has been unmatched. We truly appreciate our business relationship."

Destroy vs. Shred

Our Shred

Their Shred

It may come as a surprise, but not all forms of shredding permanently destroy sensitive documents. Incomplete shredding leaves everyone vulnerable--businesses, consumers and those that provide document destruction services.

The Predator G3 literally pulverizes the documents to bits. Other forms of shredding, such as strip shredding, cross shredding and pierce and tear have been reassembled. The shredding technology employed by the Predator G3 reduces all manner of paper to the most secure size in the industry, providing customers with maximum security.

Because the Predator G3 shreds paper, the end product is easily recycled.

What to Destroy

Account data

Banking information

Brainstorming notes

Cancelled checks

Copies of checks

Customers' addresses

Customers' names

Drafts of contracts

Drafts of letters

Drafts of proposals

Education records

Employee information

Insurance information

Internal memos

Loan information

Market analysis

Medical information

Misaligned forms

Misprinted copies

Obsolete contracts

Obsolete records

Patient billing information

Patient names

Payroll information

Phone logs

Phone messages

Purchase orders

Sales call reports

Sales information

Shipping data

Social Security numbers

Source: National Association for
Information Destruction (NAID)

Federal Laws

Gramm-Leach-Bliley Act (1999) Financial Services Modernization Act
This Federal legislation went into effect in 2000, the privacy provisions in the law require that financial institutions and insurance companies give consumers prior notice of an intention to share personal information and a chance to opt out of the sharing of such information. The law states that these institutions and companies need to "respect the privacy of its customers and to protect the security and confidentiality of those customers' non-public information." The language suggested in the Safeguard Rule that paper documents containing such personal information should also be protected and safely destroyed.

The Fair and Accurate Credit Transaction Act (FACTA)
In general, the Act amends the Fair Credit Reporting Act ("FCRA") to enhance the accuracy of consumer reports and to allow consumers to exercise greater control regarding the type and amount of marketing solicitations they receive. FACT Act also establishes uniform national standards in key areas of regulation regarding handling and disposal of consumer information in the possession of all companies and organizations.

Health Insurance Portability & Accountability Act (HIPAA)
HIPAA was enacted in 1996 and the mandatory compliance date is April 14, 2003. All hospitals, doctors, pharmacies, health plans, medical billing companies and any other business entity involved in the healthcare industry must comply. The rules apply to all protected health information. The Standard for Privacy of Identifiable Health Information requires that covered entities put in place administrative, technical and physical safeguards to protect the privacy of protected health information. One example given of a safeguard for the proper disposal of paper documents containing protected health information is that the documents be shredded prior to disposal.

Federal Privacy Act of 1974
This law was established in 1974 to insure that government agencies protect the privacy of individuals and businesses with regard to information held by them and to hold these agencies liable for any information released without proper authorization.

Economic Espionage Act of 1996 (EEA)
The Economic Espionage Act is a very powerful law which helps with the enforcement of properly handling information. This law is the first federal law that defines and severely punishes misappropriation and theft of trade secrets. However, according to this Act, the government will only protect companies who take "reasonable measures" to safeguard their information.